An information disclosure flaw was found in the way asynchronous context implementation of Apache Tomcat, an Apache Servlet/JSP Engine, performed request information management in certain circumstances (formerly certain elements of a previous request might have been exposed to the current request). If an application used AsyncListeners that threw RuntimeExceptions, a remote attacker could use this flaw to possibly obtain sensitive information. Upstream bug report: https://issues.apache.org/bugzilla/show_bug.cgi?id=54178 Relevant upstream patch (including testcase): http://svn.apache.org/viewvc?view=rev&rev=1471372
This issue affects the versions of the tomcat package, as shipped with Fedora release of 17 and 18. Please schedule an update. -- This issue did NOT affect the versions of the tomcat6 packages, as shipped with Fedora release of 17 and 18 (as those versions did not contain the vulnerable code part yet).
Created tomcat tracking bugs for this issue Affects: fedora-all [bug 961806]
Statement: This flaw only affects tomcat 7. Tomcat 5 and 6 are not affected. The jbossweb servlet container is also not affected.
This issue has been addressed in following products: JBEWS 2 for RHEL 6 Via RHSA-2013:1012 https://rhn.redhat.com/errata/RHSA-2013-1012.html
This issue has been addressed in following products: JBEWS 2 for RHEL 5 Via RHSA-2013:1011 https://rhn.redhat.com/errata/RHSA-2013-1011.html
This issue has been addressed in following products: Red Hat JBoss Web Server 2.0.1 Via RHSA-2013:1013 https://rhn.redhat.com/errata/RHSA-2013-1013.html